Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (289 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Social sciences - Data processing Education - Data processing Computer vision Artificial Intelligence Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computers and Education Computer Vision Informàtica Investigació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
Soggetto non controllato | Mathematics |
ISBN | 3-031-09469-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996478861003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (289 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Social sciences - Data processing Education - Data processing Computer vision Artificial Intelligence Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computers and Education Computer Vision Informàtica Investigació |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-031-09469-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910580172403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (297 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer networks Computer architecture |
ISBN | 981-16-3653-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Hardware -- Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 1.3 Organisation of the Paper -- 2 Proposed Rectenna Design -- 2.1 Slotted Antenna Design -- 2.2 Greinacher Voltage Doubler Iinspired Rectifier Circuit -- 3 Results and Discussions -- 3.1 Results of Slotted Antenna -- 3.2 Results for Rectifier Circuit -- 4 Conclusion -- 5 Future Work -- References -- Optimised Multi Energy System (OMES) for Electric Vehicle -- 1 Introduction -- 2 Literature Overview -- 3 Proposed Mechanism Using Solar Energy and MESS -- 4 Result Analysis -- 5 Conclusion -- References -- Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms -- 1 Introduction -- 2 Antenna Configuration -- 3 ANN Model of a Patch Antenna -- 4 ANN Algorithms -- 4.1 RBF Model -- 4.2 MLP Model -- 5 Determining the Parameters of Patch Antenna Using ANN -- 6 Modeling the Patch Antenna in CST -- 7 Conclusion -- References -- Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart Grid -- 1 Introduction -- 2 Smart Meter -- 2.1 Introduction and Architecture -- 2.2 Challenges of Smart Meter -- 3 Smart PDM 1.0 - Smart Power Data Measurement System -- 3.1 System Model -- 3.2 Architecture -- 4 Working Prototype and Results -- 4.1 Step and Algorithm -- 4.2 Working of System -- 5 Results and Discussion -- 5.1 Test Results at the Laboratory -- 5.2 Test Results at a Household -- 5.3 Testing and Calibration -- 5.4 Conclusion and Future Scope -- References -- GSM Based Remote Distribution Transformer Condition Monitoring System -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 4 Case Study: PNG Power Ltd.
4.1 Distribution Transformer Current Measurement -- 4.2 Distribution Transformer Voltage Measurement -- 5 Hardware Simulation -- 5.1 Hardware Simulation with LCD Display -- 5.2 Hardware Simulation with GSM SIM808 Alert SMS -- 6 Conclusion -- References -- Networks -- Performance Analysis and Classification of Node Capture Attack Models in WSN -- 1 Introduction -- 2 Related Work -- 3 Modeling in Wireless Network -- 3.1 Key Distribution Modelling -- 3.2 Link-Based Modeling -- 3.3 Network-Based Modeling -- 3.4 Adversarial Based Modeling -- 4 Classification of Node Capture Attack Models -- 4.1 Random Attack (RA) -- 4.2 Maximum Key Attack (MKA) -- 4.3 Maximum Link Attack (MLA) -- 4.4 Dominating Node Attack (DNA) -- 4.5 Maximum Traffic Attack (MTA) -- 4.6 Greedy Node Capture Approximation Using Vulnerability Evaluation (GNAVE) -- 4.7 Matrix Based Attack (MA) -- 4.8 Full Graph Attack (FGA) -- 4.9 Opti-Graph Attack (OGA) -- 4.10 Minimum Resource Expenditure Attack (MREA) -- 4.11 Path Covering Attack (PCA) -- 4.12 Generic Algorithm (GA) -- 4.13 Fruit Fly Optimization Algorithm (FFOA) -- 4.14 Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FiRAO-PG (GA)) -- 5 Simulations and Experiments -- 5.1 Fraction of Compromised Traffic -- 5.2 Energy Cost -- 6 Conclusion and Future Work -- References -- An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers -- 1 Introduction -- 2 Review of Literature -- 3 Components of the Model -- 4 Block Diagram of Missed Call Messaging Service -- 5 Algorithm/Working of IoT Based Device -- 6 Advantages -- 7 Results and Discussion -- 8 Conclusion -- 9 Future Work -- References -- A Divide and Conquer Based Data Aggregation Technique for WBANs -- 1 Introduction -- 2 Related Work -- 3 Data Aggregation -- 4 Implementation and Observations. 4.1 Performance Evaluation w.r.t. Number of Packets -- 4.2 Performance Evaluation w.r.t. Energy Consumption -- 4.3 Performance Evaluation w.r.t. Average Delay -- 4.4 Performance Evaluation w.r.t. Packet Delivery Ratio -- 4.5 Performance Evaluation w.r.t. Network Lifetime -- 5 Coclusion and Future Scope -- References -- Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT -- 1 Introduction -- 2 Open Challenges in 5G and IoT -- 2.1 IoT Emerging Technologies and Challenges -- 2.2 5G Emerging Technologies and Challenges -- 3 5G Enabled IoT Technologies and Challenges -- 3.1 Network Function Virtualization (NFV) -- 3.2 Heterogeneous Network (HetNet) -- 3.3 Device to Device Communication -- 3.4 Advanced Spectrum and Interference Administration -- 4 Suggested Security Solution -- 4.1 Blockchain Technique -- 4.2 Proposed Solution -- 5 Conclusion -- References -- A Performance Discussion of Web Crawler Using Some Advanced Factors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work -- 5 Results -- 6 Comparison Chart -- 7 Conclusion -- 8 Future Scope -- References -- Internet of Things in Healthcare: A Review -- 1 Introduction -- 2 IoT in Disease Diagnostics -- 3 IoT for Health Monitoring -- 4 IoT in Predictive Medicine -- 5 IoT in Storage of Medicine -- 6 Challenges -- 7 Discussion and Conclusion -- References -- Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview -- 1 Introduction -- 2 Motivation -- 2.1 The Economy -- 2.2 The Lesson -- 2.3 The Problem -- 3 Background -- 4 Conventional System -- 5 Proposed System -- 5.1 Inter-Vehicular Communication (IVC) -- 5.2 Navigation with Indian Constellation (NavIC) -- 5.3 Machine Learning -- 5.4 Sensors -- 6 Functioning Methodology -- 6.1 Phase-I: Training -- 6.2 Phase-II: Actual Implementation. 7 System Workflow -- 8 Performance Measure -- 9 Observations -- 10 Conclusion -- 11 Limitations -- 12 Future Work -- References -- Wireless Sensor Networks Source Location Privacy Preservation Mechanism -- 1 Introduction -- 2 Existing Works -- 3 Problem Definition -- 4 Network Model -- 5 Adversary Model -- 6 PSLP Implementation -- 7 Phantom Nodes Determination -- 8 Fake Sources Determination -- 9 Performance Evaluation -- 10 Conclusions -- References -- A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Routing Strategy and Design Challenges in WSNs -- 3 Data Aggregation Scheme in WSN -- 4 Related Work -- 5 Security Schemes for Aggregation Routing -- 5.1 Key Management Scheme -- 5.2 Certification -- 5.3 Routing Security -- 6 Research Gap -- 7 Conclusion -- References -- Comparative Analysis of Internet of Things (IoT) Security Models -- 1 Introduction -- 2 Related Work -- 3 Overview of the Existing Security Models -- 3.1 The Amazon Web Service Model -- 3.2 Trust Model in IoT-Enabled Vehicular Netwokrs -- 3.3 Autonomous IoT/IıoT Security Model -- 4 Analysis and Discussion -- 5 Future Scope in IoT-Based Security -- 6 Conclusion -- References -- Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks -- 1 Introduction -- 2 Classification of RPs -- 2.1 Proactive RPs -- 2.2 Reactive RPs -- 2.3 Hybrid RPs -- 3 Latest Research Works Reported in Literature -- 4 Conclusion -- References -- IoT Based Smart Transport Management System -- 1 Introduction -- 2 Traffic Congestion Control System -- 3 Traffic Density Monitoring Module (TDMM) -- 4 Traffic Message Channel (TMC) -- 5 Traffic Management Module (TMM) -- 6 Working of Traffic Density Monitoring Module -- 7 Case Study: 1 -- 8 Case Study: 2 -- 9 Vehicle to Vehicle Communication Protocol Design -- 10 Conclusion -- References. Vehicular Ad Hoc Network: Routing Protocols -- 1 Introduction -- 2 Routings Protocols of VANET -- 2.1 Based on Topology -- 2.2 Based on Position -- 2.3 Based on Cluster -- 2.4 Based on Broadcast -- 2.5 Based on Geo-Cast -- 3 Distance Sequance Distance Vector -- 4 Dynamic Source Routing Protocol -- 5 Zone Routing Protocol -- 6 Conclusion -- References -- A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 Enhanced Protection Use of the Physical Layer -- 2.2 GloMoSim: A Library for Large-Scale Wireless Network Emulation -- 2.3 Wireless Protection in the Physical Layer via Pre-coding Transmission via Dispersive Channels -- 2.4 Wireless Protection Physical Layer Made the Channel Independent and Fast -- 2.5 In the Face of a Military Interference with ARQ-Based Wireless Communication Networks -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Security and Privacy -- Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier -- 1 Introduction -- 1.1 XSS Attack -- 1.2 Gradient Boosting Classifier -- 1.3 Intrusion Detection System -- 2 Literature Survey -- 3 Problem Statement -- 4 Description of the Proposed System -- 4.1 Data Analysis -- 4.2 Feature Selection -- 4.3 Prediction -- 5 Implementation -- 5.1 The Dataset -- 5.2 Correlation -- 5.3 Performance Evaluation Metrics -- 6 Result and Conclusion -- 7 Future Enhancements -- References -- Crypto Key Protection Generated from Images and Chaotic Logistic Maps -- 1 Introduction -- 2 Background Survey -- 3 Proposed Approach with Its Implementation -- 3.1 Basic Terminology -- 3.2 Algorithm -- 3.3 Experimental Evaluation -- 4 Conclusion and Future Scope -- References. An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm. |
Record Nr. | UNISA-996464411803316 |
Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (297 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer networks Computer architecture |
ISBN | 981-16-3653-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Hardware -- Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 1.3 Organisation of the Paper -- 2 Proposed Rectenna Design -- 2.1 Slotted Antenna Design -- 2.2 Greinacher Voltage Doubler Iinspired Rectifier Circuit -- 3 Results and Discussions -- 3.1 Results of Slotted Antenna -- 3.2 Results for Rectifier Circuit -- 4 Conclusion -- 5 Future Work -- References -- Optimised Multi Energy System (OMES) for Electric Vehicle -- 1 Introduction -- 2 Literature Overview -- 3 Proposed Mechanism Using Solar Energy and MESS -- 4 Result Analysis -- 5 Conclusion -- References -- Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms -- 1 Introduction -- 2 Antenna Configuration -- 3 ANN Model of a Patch Antenna -- 4 ANN Algorithms -- 4.1 RBF Model -- 4.2 MLP Model -- 5 Determining the Parameters of Patch Antenna Using ANN -- 6 Modeling the Patch Antenna in CST -- 7 Conclusion -- References -- Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart Grid -- 1 Introduction -- 2 Smart Meter -- 2.1 Introduction and Architecture -- 2.2 Challenges of Smart Meter -- 3 Smart PDM 1.0 - Smart Power Data Measurement System -- 3.1 System Model -- 3.2 Architecture -- 4 Working Prototype and Results -- 4.1 Step and Algorithm -- 4.2 Working of System -- 5 Results and Discussion -- 5.1 Test Results at the Laboratory -- 5.2 Test Results at a Household -- 5.3 Testing and Calibration -- 5.4 Conclusion and Future Scope -- References -- GSM Based Remote Distribution Transformer Condition Monitoring System -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 4 Case Study: PNG Power Ltd.
4.1 Distribution Transformer Current Measurement -- 4.2 Distribution Transformer Voltage Measurement -- 5 Hardware Simulation -- 5.1 Hardware Simulation with LCD Display -- 5.2 Hardware Simulation with GSM SIM808 Alert SMS -- 6 Conclusion -- References -- Networks -- Performance Analysis and Classification of Node Capture Attack Models in WSN -- 1 Introduction -- 2 Related Work -- 3 Modeling in Wireless Network -- 3.1 Key Distribution Modelling -- 3.2 Link-Based Modeling -- 3.3 Network-Based Modeling -- 3.4 Adversarial Based Modeling -- 4 Classification of Node Capture Attack Models -- 4.1 Random Attack (RA) -- 4.2 Maximum Key Attack (MKA) -- 4.3 Maximum Link Attack (MLA) -- 4.4 Dominating Node Attack (DNA) -- 4.5 Maximum Traffic Attack (MTA) -- 4.6 Greedy Node Capture Approximation Using Vulnerability Evaluation (GNAVE) -- 4.7 Matrix Based Attack (MA) -- 4.8 Full Graph Attack (FGA) -- 4.9 Opti-Graph Attack (OGA) -- 4.10 Minimum Resource Expenditure Attack (MREA) -- 4.11 Path Covering Attack (PCA) -- 4.12 Generic Algorithm (GA) -- 4.13 Fruit Fly Optimization Algorithm (FFOA) -- 4.14 Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FiRAO-PG (GA)) -- 5 Simulations and Experiments -- 5.1 Fraction of Compromised Traffic -- 5.2 Energy Cost -- 6 Conclusion and Future Work -- References -- An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers -- 1 Introduction -- 2 Review of Literature -- 3 Components of the Model -- 4 Block Diagram of Missed Call Messaging Service -- 5 Algorithm/Working of IoT Based Device -- 6 Advantages -- 7 Results and Discussion -- 8 Conclusion -- 9 Future Work -- References -- A Divide and Conquer Based Data Aggregation Technique for WBANs -- 1 Introduction -- 2 Related Work -- 3 Data Aggregation -- 4 Implementation and Observations. 4.1 Performance Evaluation w.r.t. Number of Packets -- 4.2 Performance Evaluation w.r.t. Energy Consumption -- 4.3 Performance Evaluation w.r.t. Average Delay -- 4.4 Performance Evaluation w.r.t. Packet Delivery Ratio -- 4.5 Performance Evaluation w.r.t. Network Lifetime -- 5 Coclusion and Future Scope -- References -- Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT -- 1 Introduction -- 2 Open Challenges in 5G and IoT -- 2.1 IoT Emerging Technologies and Challenges -- 2.2 5G Emerging Technologies and Challenges -- 3 5G Enabled IoT Technologies and Challenges -- 3.1 Network Function Virtualization (NFV) -- 3.2 Heterogeneous Network (HetNet) -- 3.3 Device to Device Communication -- 3.4 Advanced Spectrum and Interference Administration -- 4 Suggested Security Solution -- 4.1 Blockchain Technique -- 4.2 Proposed Solution -- 5 Conclusion -- References -- A Performance Discussion of Web Crawler Using Some Advanced Factors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work -- 5 Results -- 6 Comparison Chart -- 7 Conclusion -- 8 Future Scope -- References -- Internet of Things in Healthcare: A Review -- 1 Introduction -- 2 IoT in Disease Diagnostics -- 3 IoT for Health Monitoring -- 4 IoT in Predictive Medicine -- 5 IoT in Storage of Medicine -- 6 Challenges -- 7 Discussion and Conclusion -- References -- Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview -- 1 Introduction -- 2 Motivation -- 2.1 The Economy -- 2.2 The Lesson -- 2.3 The Problem -- 3 Background -- 4 Conventional System -- 5 Proposed System -- 5.1 Inter-Vehicular Communication (IVC) -- 5.2 Navigation with Indian Constellation (NavIC) -- 5.3 Machine Learning -- 5.4 Sensors -- 6 Functioning Methodology -- 6.1 Phase-I: Training -- 6.2 Phase-II: Actual Implementation. 7 System Workflow -- 8 Performance Measure -- 9 Observations -- 10 Conclusion -- 11 Limitations -- 12 Future Work -- References -- Wireless Sensor Networks Source Location Privacy Preservation Mechanism -- 1 Introduction -- 2 Existing Works -- 3 Problem Definition -- 4 Network Model -- 5 Adversary Model -- 6 PSLP Implementation -- 7 Phantom Nodes Determination -- 8 Fake Sources Determination -- 9 Performance Evaluation -- 10 Conclusions -- References -- A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Routing Strategy and Design Challenges in WSNs -- 3 Data Aggregation Scheme in WSN -- 4 Related Work -- 5 Security Schemes for Aggregation Routing -- 5.1 Key Management Scheme -- 5.2 Certification -- 5.3 Routing Security -- 6 Research Gap -- 7 Conclusion -- References -- Comparative Analysis of Internet of Things (IoT) Security Models -- 1 Introduction -- 2 Related Work -- 3 Overview of the Existing Security Models -- 3.1 The Amazon Web Service Model -- 3.2 Trust Model in IoT-Enabled Vehicular Netwokrs -- 3.3 Autonomous IoT/IıoT Security Model -- 4 Analysis and Discussion -- 5 Future Scope in IoT-Based Security -- 6 Conclusion -- References -- Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks -- 1 Introduction -- 2 Classification of RPs -- 2.1 Proactive RPs -- 2.2 Reactive RPs -- 2.3 Hybrid RPs -- 3 Latest Research Works Reported in Literature -- 4 Conclusion -- References -- IoT Based Smart Transport Management System -- 1 Introduction -- 2 Traffic Congestion Control System -- 3 Traffic Density Monitoring Module (TDMM) -- 4 Traffic Message Channel (TMC) -- 5 Traffic Management Module (TMM) -- 6 Working of Traffic Density Monitoring Module -- 7 Case Study: 1 -- 8 Case Study: 2 -- 9 Vehicle to Vehicle Communication Protocol Design -- 10 Conclusion -- References. Vehicular Ad Hoc Network: Routing Protocols -- 1 Introduction -- 2 Routings Protocols of VANET -- 2.1 Based on Topology -- 2.2 Based on Position -- 2.3 Based on Cluster -- 2.4 Based on Broadcast -- 2.5 Based on Geo-Cast -- 3 Distance Sequance Distance Vector -- 4 Dynamic Source Routing Protocol -- 5 Zone Routing Protocol -- 6 Conclusion -- References -- A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 Enhanced Protection Use of the Physical Layer -- 2.2 GloMoSim: A Library for Large-Scale Wireless Network Emulation -- 2.3 Wireless Protection in the Physical Layer via Pre-coding Transmission via Dispersive Channels -- 2.4 Wireless Protection Physical Layer Made the Channel Independent and Fast -- 2.5 In the Face of a Military Interference with ARQ-Based Wireless Communication Networks -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Security and Privacy -- Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier -- 1 Introduction -- 1.1 XSS Attack -- 1.2 Gradient Boosting Classifier -- 1.3 Intrusion Detection System -- 2 Literature Survey -- 3 Problem Statement -- 4 Description of the Proposed System -- 4.1 Data Analysis -- 4.2 Feature Selection -- 4.3 Prediction -- 5 Implementation -- 5.1 The Dataset -- 5.2 Correlation -- 5.3 Performance Evaluation Metrics -- 6 Result and Conclusion -- 7 Future Enhancements -- References -- Crypto Key Protection Generated from Images and Chaotic Logistic Maps -- 1 Introduction -- 2 Background Survey -- 3 Proposed Approach with Its Implementation -- 3.1 Basic Terminology -- 3.2 Algorithm -- 3.3 Experimental Evaluation -- 4 Conclusion and Future Scope -- References. An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm. |
Record Nr. | UNINA-9910485587303321 |
Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (698 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Social sciences - Data processing Education - Data processing Image processing - Digital techniques Computer vision Artificial Intelligence Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computers and Education Computer Imaging, Vision, Pattern Recognition and Graphics Informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-16-3660-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Computing Methodologies -- Analysis of Developers' Sentiments in Commit Comments -- 1 Introduction -- 2 Related Literature -- 3 Research Methodology -- 3.1 Research Data -- 3.2 Sentiment Analysis -- 4 Results -- 5 Threat to Validity -- 6 Conclusions -- References -- Design of UML Diagrams for Intervention for Autism Children (IAC System) -- 1 Introduction -- 2 Functionalities of the System -- 3 Proposed IAC System -- 3.1 System Architecture -- 3.2 Data Flow Diagram -- 4 UML Diagrams -- 4.1 UML Usecase Diagram -- 4.2 UML Class Diagram -- 4.3 UML Activity Diagram -- 4.4 UML Sequence Diagram -- 4.5 UML Collaboration Diagram -- 4.6 UML State Machine Diagram -- 4.7 UML Component Diagram -- 4.8 UML Deployment Diagram -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- Data Analysis and Forecasting of COVID-19 Outbreak in India Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Proposed Methodology -- 4 Result Analysıs -- 5 Conclusion -- References -- Analysis Paper on Different Algorithm, Dataset and Devices Used for Fundus Images -- 1 Introduction -- 2 Analysis Color Fundus Images -- 2.1 Image Pre-processing -- 2.2 Dataset -- 2.3 DRISHTI-GS -- 3 Partitioning -- 4 Fundus Photography Sustainability with the Latest Devices in Current Health-Care Also -- 5 Limitations in the Earlier Fundus Camera -- 6 Machine Learning Methods for Vessel Extraction -- 7 Conclusion -- References -- Fuzzy Controller for Indoor Air Quality Control: A Sport Complex Case Study -- 1 Introduction -- 2 Background -- 3 Model -- 4 Fuzzy Controller -- 5 Results -- 6 Conclusion -- References -- Cancer Prediction Using Novel Ranking Algorithms and Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology.
3.1 Ranking Based Algorithms -- 3.2 MAR (Mean Accuracy Ranking) -- 3.3 CDR (Class Differential Ranking) -- 3.4 PCR (Per Class Ranking) -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Applying Base Classifiers -- 4.4 Applying Ranking Based Algorithms -- 4.5 Final Model -- 4.6 Comparison of Results with Previous Work -- 5 Conclusion -- References -- Supervısed Learnıng Algorıthm: A Survey -- 1 Introduction -- 2 Methodologies Analysis in Supervised Learning -- 2.1 Logistic Regression -- 2.2 Support Vector Classifier -- 2.3 Decision Tree -- 2.4 Random Forest Classifiers -- 3 Related Work -- 4 Chart of References -- 5 Conclusıon and Future Scope -- References -- Searching Sub-classes Within Type Ia Supernova Using DBSCAN -- 1 Introduction -- 2 Data Set -- 3 Methodology -- 3.1 Validity of DBSCAN -- 4 Results -- 5 Conclusions -- 6 Scope of Study -- References -- Abnormality Detection Based on ECG Segmentation -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Software Requirements -- 3.2 Our Methodology -- 4 Flowchart of the Proposed Model -- 5 Experiments and Results -- 5.1 Observation Table -- 6 Conclusion -- References -- Detection and Classification of Toxic Comments by Using LSTM and Bi-LSTM Approach -- 1 Introduction -- 2 Literature Review -- 3 Algorithms and Techniques Used -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Bi-directional Long Short-Term Memory (Bi-LSTM) -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Data Analysis -- 4.3 Data Pre-processing -- 4.4 Data Conversion to Input Matrix -- 4.5 Build LSTM and Bi-LSTM Model -- 5 Experimental Results and Analysis -- 6 Conclusion and Future Scope -- References -- On the Effects of Substitution Matrix Choices for Pairwise Gapped Global Sequence Alignment of DNA Nucleotides -- 1 Background -- 2 Methods -- 3 Results and Discussion. 4 Conclusion and Future Work -- References -- Case Based Reasoning Approaches for Reuse and Adaptation in Community Question Answering System -- 1 Introduction -- 2 Research Perspective -- 2.1 CQA Approach -- 2.2 Case Based Analysis for Reuse of Information -- 2.3 Textual Comparison Systems -- 2.4 Graphical Textual Likeliness Approach -- 2.5 Bayesian System for Query-Responses -- 3 Experimentation and Methodology -- 3.1 Graphical Configuration -- 3.2 Initial Processing -- 3.3 Similarity Methods -- 3.4 Reuse and Adaptation -- 4 Assessment -- 4.1 Characteristics and Threshold Limits -- 4.2 Association with Human Assessment -- 4.3 Recall and Precision -- 5 Discussion -- 6 Conclusions -- References -- Depression Detection During the Covid 19 Pandemic by Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Result Analysis from Literature Survey -- 5 Limitation -- 6 Conclusion and Future Work -- References -- Mucus Plug Blockage Detection in COVID-19 Patient's Chest X-Ray Using Instance Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology and Result Analysis -- 4 Conclusion -- References -- Applying Machine Learning to Detect Depression-Related Texts on Social Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Tools -- 4 Data Exploration -- 5 Experiment Results -- 6 Conclusion and Future Work -- References -- Usability Improvements in E-Governance Applications with Simple and Usable Interface (Design Stage) -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Proposed Tools and Technique -- 3.2 Proposed Data -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- 5.1 Future Scope for Researchers -- 5.2 Future Scope for Public Administrator -- References. PGF Cyberpolicing to Defuse Fake Government of Telangana (FGoT), Fake Government of India (FGoI) and Cybercriminal Legacy -- 1 Introduction -- 2 What Is Fake Government of India - The First FGIIH? -- 3 PGF's AI Solution Approach to CSFGoT -- 4 Disaster Management of Big Data Crimes -- 4.1 The Corona Menace vis-a-vis the FGoT/FGoI Menace -- 5 Cognitive Visuals of Cyberpolicing R& -- D Chief's PGF Organizational Efforts for Adaptive Academic Management: Google Plus Social Network Account, Kcraiah's Snapshots -- 6 Conclusions -- References -- Energy Consumption Analysis of R-Based Machine Learning Algorithms for Pandemic Predictions -- 1 Introduction -- 2 Related Work -- 3 Energy Analysis - An Extended Version -- 4 COVID-19 and ML Algorithms -- 4.1 RandomForest - A Brief -- 4.2 COVID-19 Predictions -- 4.3 Popular Packages -- 5 Experimental Results -- 5.1 Validation Analysis -- 5.2 Prediction Analysis -- 5.3 Energy Consumption Analysis -- 6 Conclusion -- References -- Performance Analysis of Deep Learning Classification for Agriculture Applications Using Sentinel-2 Data -- 1 Introduction -- 2 Study Area and Satellite Dataset -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Deep Learning Process -- 3.3 Classification -- 4 Experimental Analysis -- 5 Conclusion -- References -- Smart Approach for Identification of Pneumonia Using Real-Time Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 System Blueprint -- 3.1 Processing System -- 3.2 Setting up System for Use -- 3.3 Anaconda IDE and Jupyter Notebook -- 3.4 Project Environment -- 3.5 Proposed Model -- 3.6 Modeling -- 3.7 Training -- 4 Experimental Results and Outcomes -- 4.1 Data Enrichment -- 4.2 Performance Measures -- 5 Experimental Results -- 5.1 Results -- 5.2 Accuracy and Loss of Proposed Model -- 6 Conclusion and Future Scopes -- References. A Comparative Study of Deep Learning Techniques for Emotion Estimation Based on E-Learning Through Cognitive State Analysis -- 1 Introduction -- 1.1 Emotion Identification with Facial Expressions -- 1.2 Facial Expression Analysis in E-Learning Systems -- 1.3 Introduction to Cognitive State Analysis in Education -- 2 Related Work -- 3 Comparison Among Various Methods -- 4 Result Analysis from Literature Review -- 5 Conclusion -- References -- Detection of Epileptic Seizures in Long-Term Human EEG by Improved Linear Discriminant Analysis (ILDA) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Convolutional Neural Networks -- 4.1 Linear Discriminant Analysis -- 5 Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Facial Emotional Recognition Using Legion Kernel Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Model Architecture -- 2.2 Dataset Training Flowchart -- 2.3 Output Data Flowchart -- 3 Experiment and Results -- 3.1 Procedure -- 3.2 Results -- 4 Advantages and Disadvantages -- 4.1 Advantages -- 4.2 Disadvantages -- 5 Conclusion -- References -- An Attention Based Automatic Image Description Generation -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Architecture -- 4 Training Process -- 5 Experiments Conduction and Result Analysis -- 5.1 Data set -- 5.2 Visualizations from Our Attention Models -- 5.3 Results Obtained -- 6 Conclusion -- 7 Future Scope -- References -- Providing Safety for Citizens and Tourists in Cities: A System for Detecting Anomalous Sounds -- 1 Introduction -- 2 Materials and Methods -- 2.1 Audio Features in the Time Domain -- 2.2 Zero-Crossing Rate -- 3 Results -- 3.1 Dataset -- 4 Conclusion -- References -- Mobilenet V2-FCD: Fake Currency Note Detection -- 1 Introduction -- 2 Literature Study -- 3 Proposed System -- 3.1 Data Collection -- 3.2 Data Pre-processing. 3.3 Data Augmentation. |
Record Nr. | UNISA-996464506403316 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (698 pages) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer engineering Computer networks Social sciences - Data processing Education - Data processing Image processing - Digital techniques Computer vision Artificial Intelligence Computer Engineering and Networks Computer Application in Social and Behavioral Sciences Computers and Education Computer Imaging, Vision, Pattern Recognition and Graphics Informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-16-3660-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Computing Methodologies -- Analysis of Developers' Sentiments in Commit Comments -- 1 Introduction -- 2 Related Literature -- 3 Research Methodology -- 3.1 Research Data -- 3.2 Sentiment Analysis -- 4 Results -- 5 Threat to Validity -- 6 Conclusions -- References -- Design of UML Diagrams for Intervention for Autism Children (IAC System) -- 1 Introduction -- 2 Functionalities of the System -- 3 Proposed IAC System -- 3.1 System Architecture -- 3.2 Data Flow Diagram -- 4 UML Diagrams -- 4.1 UML Usecase Diagram -- 4.2 UML Class Diagram -- 4.3 UML Activity Diagram -- 4.4 UML Sequence Diagram -- 4.5 UML Collaboration Diagram -- 4.6 UML State Machine Diagram -- 4.7 UML Component Diagram -- 4.8 UML Deployment Diagram -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- Data Analysis and Forecasting of COVID-19 Outbreak in India Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Proposed Methodology -- 4 Result Analysıs -- 5 Conclusion -- References -- Analysis Paper on Different Algorithm, Dataset and Devices Used for Fundus Images -- 1 Introduction -- 2 Analysis Color Fundus Images -- 2.1 Image Pre-processing -- 2.2 Dataset -- 2.3 DRISHTI-GS -- 3 Partitioning -- 4 Fundus Photography Sustainability with the Latest Devices in Current Health-Care Also -- 5 Limitations in the Earlier Fundus Camera -- 6 Machine Learning Methods for Vessel Extraction -- 7 Conclusion -- References -- Fuzzy Controller for Indoor Air Quality Control: A Sport Complex Case Study -- 1 Introduction -- 2 Background -- 3 Model -- 4 Fuzzy Controller -- 5 Results -- 6 Conclusion -- References -- Cancer Prediction Using Novel Ranking Algorithms and Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology.
3.1 Ranking Based Algorithms -- 3.2 MAR (Mean Accuracy Ranking) -- 3.3 CDR (Class Differential Ranking) -- 3.4 PCR (Per Class Ranking) -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Applying Base Classifiers -- 4.4 Applying Ranking Based Algorithms -- 4.5 Final Model -- 4.6 Comparison of Results with Previous Work -- 5 Conclusion -- References -- Supervısed Learnıng Algorıthm: A Survey -- 1 Introduction -- 2 Methodologies Analysis in Supervised Learning -- 2.1 Logistic Regression -- 2.2 Support Vector Classifier -- 2.3 Decision Tree -- 2.4 Random Forest Classifiers -- 3 Related Work -- 4 Chart of References -- 5 Conclusıon and Future Scope -- References -- Searching Sub-classes Within Type Ia Supernova Using DBSCAN -- 1 Introduction -- 2 Data Set -- 3 Methodology -- 3.1 Validity of DBSCAN -- 4 Results -- 5 Conclusions -- 6 Scope of Study -- References -- Abnormality Detection Based on ECG Segmentation -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Software Requirements -- 3.2 Our Methodology -- 4 Flowchart of the Proposed Model -- 5 Experiments and Results -- 5.1 Observation Table -- 6 Conclusion -- References -- Detection and Classification of Toxic Comments by Using LSTM and Bi-LSTM Approach -- 1 Introduction -- 2 Literature Review -- 3 Algorithms and Techniques Used -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Bi-directional Long Short-Term Memory (Bi-LSTM) -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Data Analysis -- 4.3 Data Pre-processing -- 4.4 Data Conversion to Input Matrix -- 4.5 Build LSTM and Bi-LSTM Model -- 5 Experimental Results and Analysis -- 6 Conclusion and Future Scope -- References -- On the Effects of Substitution Matrix Choices for Pairwise Gapped Global Sequence Alignment of DNA Nucleotides -- 1 Background -- 2 Methods -- 3 Results and Discussion. 4 Conclusion and Future Work -- References -- Case Based Reasoning Approaches for Reuse and Adaptation in Community Question Answering System -- 1 Introduction -- 2 Research Perspective -- 2.1 CQA Approach -- 2.2 Case Based Analysis for Reuse of Information -- 2.3 Textual Comparison Systems -- 2.4 Graphical Textual Likeliness Approach -- 2.5 Bayesian System for Query-Responses -- 3 Experimentation and Methodology -- 3.1 Graphical Configuration -- 3.2 Initial Processing -- 3.3 Similarity Methods -- 3.4 Reuse and Adaptation -- 4 Assessment -- 4.1 Characteristics and Threshold Limits -- 4.2 Association with Human Assessment -- 4.3 Recall and Precision -- 5 Discussion -- 6 Conclusions -- References -- Depression Detection During the Covid 19 Pandemic by Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Result Analysis from Literature Survey -- 5 Limitation -- 6 Conclusion and Future Work -- References -- Mucus Plug Blockage Detection in COVID-19 Patient's Chest X-Ray Using Instance Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology and Result Analysis -- 4 Conclusion -- References -- Applying Machine Learning to Detect Depression-Related Texts on Social Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Tools -- 4 Data Exploration -- 5 Experiment Results -- 6 Conclusion and Future Work -- References -- Usability Improvements in E-Governance Applications with Simple and Usable Interface (Design Stage) -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Proposed Tools and Technique -- 3.2 Proposed Data -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- 5.1 Future Scope for Researchers -- 5.2 Future Scope for Public Administrator -- References. PGF Cyberpolicing to Defuse Fake Government of Telangana (FGoT), Fake Government of India (FGoI) and Cybercriminal Legacy -- 1 Introduction -- 2 What Is Fake Government of India - The First FGIIH? -- 3 PGF's AI Solution Approach to CSFGoT -- 4 Disaster Management of Big Data Crimes -- 4.1 The Corona Menace vis-a-vis the FGoT/FGoI Menace -- 5 Cognitive Visuals of Cyberpolicing R& -- D Chief's PGF Organizational Efforts for Adaptive Academic Management: Google Plus Social Network Account, Kcraiah's Snapshots -- 6 Conclusions -- References -- Energy Consumption Analysis of R-Based Machine Learning Algorithms for Pandemic Predictions -- 1 Introduction -- 2 Related Work -- 3 Energy Analysis - An Extended Version -- 4 COVID-19 and ML Algorithms -- 4.1 RandomForest - A Brief -- 4.2 COVID-19 Predictions -- 4.3 Popular Packages -- 5 Experimental Results -- 5.1 Validation Analysis -- 5.2 Prediction Analysis -- 5.3 Energy Consumption Analysis -- 6 Conclusion -- References -- Performance Analysis of Deep Learning Classification for Agriculture Applications Using Sentinel-2 Data -- 1 Introduction -- 2 Study Area and Satellite Dataset -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Deep Learning Process -- 3.3 Classification -- 4 Experimental Analysis -- 5 Conclusion -- References -- Smart Approach for Identification of Pneumonia Using Real-Time Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 System Blueprint -- 3.1 Processing System -- 3.2 Setting up System for Use -- 3.3 Anaconda IDE and Jupyter Notebook -- 3.4 Project Environment -- 3.5 Proposed Model -- 3.6 Modeling -- 3.7 Training -- 4 Experimental Results and Outcomes -- 4.1 Data Enrichment -- 4.2 Performance Measures -- 5 Experimental Results -- 5.1 Results -- 5.2 Accuracy and Loss of Proposed Model -- 6 Conclusion and Future Scopes -- References. A Comparative Study of Deep Learning Techniques for Emotion Estimation Based on E-Learning Through Cognitive State Analysis -- 1 Introduction -- 1.1 Emotion Identification with Facial Expressions -- 1.2 Facial Expression Analysis in E-Learning Systems -- 1.3 Introduction to Cognitive State Analysis in Education -- 2 Related Work -- 3 Comparison Among Various Methods -- 4 Result Analysis from Literature Review -- 5 Conclusion -- References -- Detection of Epileptic Seizures in Long-Term Human EEG by Improved Linear Discriminant Analysis (ILDA) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Convolutional Neural Networks -- 4.1 Linear Discriminant Analysis -- 5 Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Facial Emotional Recognition Using Legion Kernel Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Model Architecture -- 2.2 Dataset Training Flowchart -- 2.3 Output Data Flowchart -- 3 Experiment and Results -- 3.1 Procedure -- 3.2 Results -- 4 Advantages and Disadvantages -- 4.1 Advantages -- 4.2 Disadvantages -- 5 Conclusion -- References -- An Attention Based Automatic Image Description Generation -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Architecture -- 4 Training Process -- 5 Experiments Conduction and Result Analysis -- 5.1 Data set -- 5.2 Visualizations from Our Attention Models -- 5.3 Results Obtained -- 6 Conclusion -- 7 Future Scope -- References -- Providing Safety for Citizens and Tourists in Cities: A System for Detecting Anomalous Sounds -- 1 Introduction -- 2 Materials and Methods -- 2.1 Audio Features in the Time Domain -- 2.2 Zero-Crossing Rate -- 3 Results -- 3.1 Dataset -- 4 Conclusion -- References -- Mobilenet V2-FCD: Fake Currency Note Detection -- 1 Introduction -- 2 Literature Study -- 3 Proposed System -- 3.1 Data Collection -- 3.2 Data Pre-processing. 3.3 Data Augmentation. |
Record Nr. | UNINA-9910485587203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXII, 604 p. 330 illus., 209 illus. in color.) |
Disciplina | 004 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computers Artificial Intelligence Information Systems and Communication Service |
ISBN | 981-13-3143-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. . |
Record Nr. | UNINA-9910350238403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (492 pages) : illustrations (some color) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer vision Data protection Application software Algorithms Computers - Law and legislation Information technology - Law and legislation Artificial Intelligence Computer Vision Data and Information Security Computer and Information Systems Applications Legal Aspects of Computing |
ISBN | 981-15-0108-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910350216803321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xvi, 409 pages) : illustrations |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computer networks Data protection Cryptography Data encryption (Computer science) Computers Electronic digital computers - Evaluation Artificial Intelligence Computer Communication Networks Data and Information Security Cryptology Computing Milieux System Performance and Evaluation |
ISBN | 981-15-0111-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hardware -- Information Systems -- Networks -- Software and Its Engineering. . |
Record Nr. | UNINA-9910350216203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XXI, 830 p. 495 illus., 313 illus. in color.) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Artificial intelligence
Computers Artificial Intelligence Information Systems and Communication Service |
ISBN | 981-13-3140-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. . |
Record Nr. | UNINA-9910350238203321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|